CURRENT ISSUE

 

Volume 1, Issue 1

June 2025
Open Access
An AI-Driven Framework for Adaptive eSystems in Harsh Environments: A Case Study from Oilfield IoT Applications
Mustafa S. Aljumaily* , Sherwan Jalal Abdullah 
Pages: 1-7 Full Text (PDF) | (87 downloads ) | View Abstract
Harsh industrial environments such as oilfields present unique challenges to electronic systems, including extreme temperatures, limited connectivity, power constraints, and operational unpredictability. Traditional Internet of Things (IoT) deployments often fail to adapt in real-time, exposing systems to risks such as data loss, late anomaly detection, or critical failure. This paper proposes a lightweight, Artificial Intelligence (AI)-driven eSystem architecture tailored for such conditions, integrating edge intelligence, secure communication, and self-adaptive mechanisms. We demonstrate the framework’s viability through simulating a case study of real-time sensor data from pipeline infrastructure, applying a Long Short-Term Memory (LSTM)-based anomaly detection model deployed at the edge. Results show significant improvements in detection latency, bandwidth efficiency, and system resilience. The framework offers a modular blueprint for deploying AI-enhanced eSystems across energy, mining, and remote critical infrastructure domains.
Role of Chat Gpt-4 As an Assistant for Teachers in School Education and Universities
Israa M. Hayder, Hussain A. Younis*, Sani Salisu, Saadia Sharif, Muthmainnah
Pages: 8-10 | Full Text (PDF) | (322 downloads ) | View Abstract
Artificial intelligence (AI) and ChatGPT-4 have versatile applications in both school children’s education and university settings. Chat GPT-4 can be a valuable assistant for teachers in various ways. The model can utilize its comprehensive knowledge to provide additional information and concepts in diverse fields to help explain difficult topics. It can also provide extra exercises and questions to assist students in practicing and reinforcing their skills. With its predictive and linguistic generation capabilities, Chat GPT-4 can also offer review and editing for students’ essays and research papers, aiming to improve the quality of their writing and expression. It can also guide students in the research process and the collection of reliable sources. Furthermore, the model can provide individual support by answering students’ questions and guiding them through the learning process. It can also be used to create simulations and educational scenarios to enhance students’ understanding and application of theoretical concepts in realistic contexts. It is worth mentioning that the model relies on the inputs it receives, so the teacher needs to play an active role in guiding and clarifying the ideas and information provided by the model, as well as in evaluating and monitoring students’ progress.
Interdisciplinary Approaches to Smart City Development: Integrating Engineering, Urban Planning, and Social Sciences with AI and Cybersecurity Governance
Mustafa S. Aljumaily*, Hayder Kareem Abd
Pages: 11-18 | Full Text (PDF) | (75 downloads ) | View Abstract
Smart cities represent a nexus where urban planning, engineering, digital technologies, and societal needs converge. In emerging economies such as Iraq, conventional top-down smart city models often fail to account for contextual realities, resulting in fragmented or unsustainable initiatives. This paper proposes a novel interdisciplinary smart city development framework that integrates Artificial Intelligence (AI)-based planning, engineering simulations, urban design heuristics, and insights from social sciences particularly those related to digital inclusion and governance. Leveraging publicly available datasets and simulation environments, we demonstrate that the proposed approach can reduce urban traffic congestion by up to 35%, improve equitable access to public services by over 30%, forecast energy demands with more than 85% accuracy, and detect cyber threats with a precision and recall of 85.7%. These results validate the feasibility of a modular, adaptable smart city blueprint that embeds cybersecurity and data governance principles from the outset offering a scalable alternative suited to the institutional and infrastructural realities of developing contexts like Iraq.
Towards Smart Manufacturing: Implementing PI Control on PLCs in IIoT-Driven Industrial Automation
Huda S. Jaafer*, Ali A. Abed
Pages: 19-29 | Full Text (PDF) | (112 downloads ) | View Abstract
The rapid development of the Internet of Things (IoT) has drawn significant attention from both industry and academia, driven by the integration of cloud computing, big data analytics, machine learning, and cyber-physical systems in manufacturing. Programmable Logic Controllers (PLCs), long central to industrial control systems, have evolved from basic feedback control devices to advanced components capable of networking and data exchange through IoT technologies. The Industrial Internet of Things (IIoT) refers to intelligent automation systems that continuously monitor critical parameters and respond to changes in real time. The integration of IoT with PLCs is transforming industrial automation by enabling remote real-time monitoring, data-driven decision-making, and predictive maintenance through advanced analytics. IIoT technologies enhance manufacturing performance and offer strategic value across sectors. Understanding their impact involves examining current research, including technology assessments and application-based case studies. This study provides an overview of PLC systems evolving into IIoT frameworks, with a focus on implementing proportional-integral (PI) control using the Siemens S7-300. Designed for precise and consistent temperature regulation, this approach enhances process efficiency and product quality, making it highly suitable for industrial and manufacturing environments.
Utilizing Machine Learning Algorithms and SMOTE for Analyzing and Predicting Homicides
Hussain A. Younis*, Ghazwan abdulnabi, Israa M. Hayder, Sani Salisu, Maged Nasser
Pages: 30-36 | Full Text (PDF) | (317 downloads ) | View Abstract
This study analyzes homicide data in the United States from 1980 to 2014 using machine learning techniques to predict crime resolution and classify victim gender. The dataset, obtained from the FBI Supplementary Homicide Report, contains 638,454 records. Data preprocessing involved cleaning, converting categorical features to numerical values, and addressing class imbalance using Synthetic Minority Oversampling Technique )SMOTE). Various classification algorithms were applied, including Decision Tree and Naïve Bayes. The results showed that the Decision Tree model achieved 95% accuracy in predicting crime resolution and 85% accuracy in classifying victim gender, while Naïve Bayes reached 92% accuracy in crime resolution prediction. The findings highlight the effectiveness of machine learning in crime pattern analysis and prediction, aiding law enforcement in making more informed investigative decisions.
Mining Dynamic Profit Databases: Efficient Solutions for High Utility Periodic and Closed Patterns
Arkan A. Ghaib, Abdullah A. Nahi, Hussain A. Younis*, Takaaki Fujita
Pages: 37-44 | Full Text (PDF) | (154 downloads ) | View Abstract
High utility pattern mining (HUPM) is one of the key areas in data mining, which is concerned with identifying patterns with high utility from transactional databases. The temporal factors such as periodicity and recency along with dynamic variations in profits have recently been added to pattern mining. However, no methods so far unify these dimensions in a common framework. To this end, in this paper we propose the DTU-Miner algorithm that integrates temporal constraints and dynamic profit updates to overcome such limitations. Through the use of advanced data structures such as UPR-List and P-set and the introduction of some novel pruning strategies, DTU-Miner surpasses state of the art in terms of Runtime, Memory and pattern quality. Results on benchmark datasets show that DTU-Miner outperforms state-of-the-art algorithms, CPR-Miner and iEFIM-Closed, which suggests the effectiveness of DTU-Miner over dense and sparse datasets including dynamic attributes.
Smart and Sustainable Cities: The Case of Amman, Jordan
Ra’Fat A. Al-Msie’deen*
Pages: 45-53 | Full Text (PDF) | (110 downloads ) | View Abstract
In an era shaped by rapid urbanization and digital transformation, smart cities have become a global imperative for sustainable, efficient, and citizen-centric development. This article analyzes Amman’s development into a smart city, highlighting its role as a model for emerging urban areas. Leveraging recent technologies such as AI, IoT, blockchain, and big data, Amman is actively transitioning from a traditional city to a smart one enhancing mobility, energy efficiency, education, healthcare, and citizen engagement. This study examines Amman’s smart city vision and roadmap, technological infrastructure, key application domains, implemented innovation projects, and global rankings. It also explores the challenges the city faces, future research opportunities across various domains, the role of software in urban development, and the critical factors contributing to Amman’s success as a smart city. This article serves as a vital reference for researchers, policymakers, urban planners, and practitioners aiming to shape next-generation smart cities. The case of Amman underscores how strategic governance, public-private collaboration, and the effective use of emerging technologies can accelerate sustainable urban transformation.
Harnessing Large Language Models for Enhanced Cybersecurity: A Review of Their Role in Defending Against APT and Cyber Attacks
Zainab S. Aziz*, Ali A. Abed
Pages: 54-62 | Full Text (PDF) | (72 downloads ) | View Abstract
The emergence of Large Language Models (LLMs) has opened new frontiers in artificial intelligence applications across multiple domains, including cybersecurity. This paper presents a comprehensive review of the role of LLMs in enhancing cyber defense mechanisms, with a particular focus on their effectiveness in identifying, mitigating, and responding to Advanced Persistent Threats (APTs) and other sophisticated cyber-attacks. We explore the integration of LLMs in threat intelligence, anomaly detection, automated incident response, and adversarial behavior analysis. By examining recent advancements, case studies, and state-of-the-art implementations, we highlight the strengths and limitations of current LLM-based approaches. Furthermore, we assess the challenges related to scalability, adversarial robustness, and ethical considerations inherent in deploying LLMs within cybersecurity infrastructures. The review concludes with future research directions, emphasizing the need for hybrid AI systems that combine LLMs with traditional rule-based and statistical methods to provide resilient and adaptive cybersecurity solutions in the face of evolving digital threats.